Smashing WEP in a Passive Attack
From MaRDI portal
Publication:2946877
DOI10.1007/978-3-662-43933-3_9zbMath1321.94089OpenAlexW1549055687MaRDI QIDQ2946877
Pouyan Sepehrdad, Serge Vaudenay, Petr Sušil, Martin Vuagnoux
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: http://infoscience.epfl.ch/record/186876
Related Items (3)
Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs ⋮ Proving TLS-attack related open biases of RC4 ⋮ Settling the mystery of \(Z_{r} = r\) in RC4
Cites Work
- Unnamed Item
- Unnamed Item
- Attacks on the RC4 stream cipher
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Statistical Attack on RC4
- Discovery and Exploitation of New Biases in RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
- On a New Class of "Contagious" Distributions, Applicable in Entomology and Bacteriology
- SAMPLING THEORY OF THE NEGATIVE BINOMIAL AND LOGARITHMIC SERIES DISTRIBUTIONS
- On a General Class of "Contagious" Distributions
This page was built for publication: Smashing WEP in a Passive Attack